US7685637B2 - System security approaches using sub-expression automata - Google Patents
System security approaches using sub-expression automata Download PDFInfo
- Publication number
- US7685637B2 US7685637B2 US10/868,665 US86866504A US7685637B2 US 7685637 B2 US7685637 B2 US 7685637B2 US 86866504 A US86866504 A US 86866504A US 7685637 B2 US7685637 B2 US 7685637B2
- Authority
- US
- United States
- Prior art keywords
- dfa
- data units
- suspected
- data unit
- expression
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active, expires
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Networks & Wireless Communication (AREA)
- General Health & Medical Sciences (AREA)
- Virology (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computing Systems (AREA)
- Health & Medical Sciences (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
Description
Claims (46)
Priority Applications (8)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/868,665 US7685637B2 (en) | 2004-06-14 | 2004-06-14 | System security approaches using sub-expression automata |
US11/078,010 US7596809B2 (en) | 2004-06-14 | 2005-03-11 | System security approaches using multiple processing units |
TW094119165A TWI268057B (en) | 2004-06-14 | 2005-06-10 | System security approach methods using sub-expression automata, related computer-readable medium, and related systems |
EP05012772A EP1607823A3 (en) | 2004-06-14 | 2005-06-14 | Method and system for virus detection based on finite automata |
CN200510078075.2A CN1716958B (en) | 2004-06-14 | 2005-06-14 | System safety realizing method and relative system using sub form automatic machine |
EP06018243A EP1744235A1 (en) | 2004-06-14 | 2005-06-14 | Method and system for virus detection based on finite automata |
US11/307,105 US7779464B2 (en) | 2004-06-14 | 2006-01-24 | System security approaches utilizing a hierarchical memory system |
US11/422,087 US7930742B2 (en) | 2004-06-14 | 2006-06-05 | Multiple-level data processing system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/868,665 US7685637B2 (en) | 2004-06-14 | 2004-06-14 | System security approaches using sub-expression automata |
Related Child Applications (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/078,010 Continuation-In-Part US7596809B2 (en) | 2004-06-14 | 2005-03-11 | System security approaches using multiple processing units |
US11/307,105 Continuation-In-Part US7779464B2 (en) | 2004-06-14 | 2006-01-24 | System security approaches utilizing a hierarchical memory system |
US11/422,087 Continuation-In-Part US7930742B2 (en) | 2004-06-14 | 2006-06-05 | Multiple-level data processing system |
Publications (2)
Publication Number | Publication Date |
---|---|
US20050278781A1 US20050278781A1 (en) | 2005-12-15 |
US7685637B2 true US7685637B2 (en) | 2010-03-23 |
Family
ID=35462068
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/868,665 Active 2027-03-19 US7685637B2 (en) | 2004-06-14 | 2004-06-14 | System security approaches using sub-expression automata |
Country Status (3)
Country | Link |
---|---|
US (1) | US7685637B2 (en) |
CN (1) | CN1716958B (en) |
TW (1) | TWI268057B (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070118358A1 (en) * | 2005-11-08 | 2007-05-24 | Tom Alexander S | Phrase processor |
US20080263665A1 (en) * | 2007-04-20 | 2008-10-23 | Juniper Networks, Inc. | Network attack detection using partial deterministic finite automaton pattern matching |
US20080271141A1 (en) * | 2007-04-24 | 2008-10-30 | Juniper Networks, Inc. | Parallelized pattern matching using non-deterministic finite automata |
US20100192225A1 (en) * | 2009-01-28 | 2010-07-29 | Juniper Networks, Inc. | Efficient application identification with network devices |
US20110093496A1 (en) * | 2009-10-17 | 2011-04-21 | Masanori Bando | Determining whether an input string matches at least one regular expression using lookahead finite automata based regular expression detection |
US8495733B1 (en) * | 2009-03-25 | 2013-07-23 | Trend Micro Incorporated | Content fingerprinting using context offset sequences |
US9083740B1 (en) | 2009-09-28 | 2015-07-14 | Juniper Networks, Inc. | Network traffic pattern matching using adaptive deterministic finite automata |
Families Citing this family (33)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7685637B2 (en) | 2004-06-14 | 2010-03-23 | Lionic Corporation | System security approaches using sub-expression automata |
US7930742B2 (en) * | 2004-06-14 | 2011-04-19 | Lionic Corporation | Multiple-level data processing system |
US7596809B2 (en) | 2004-06-14 | 2009-09-29 | Lionic Corporation | System security approaches using multiple processing units |
US7216364B2 (en) * | 2004-06-14 | 2007-05-08 | Lionic Corporation | System security approaches using state tables |
US7779464B2 (en) * | 2004-06-14 | 2010-08-17 | Lionic Corporation | System security approaches utilizing a hierarchical memory system |
US7818806B1 (en) * | 2005-11-08 | 2010-10-19 | Nvidia Corporation | Apparatus, system, and method for offloading pattern matching scanning |
US7934255B1 (en) * | 2005-11-08 | 2011-04-26 | Nvidia Corporation | Apparatus, system, and method for offloading packet classification |
US20070118532A1 (en) * | 2005-11-22 | 2007-05-24 | Ping-Piao Lu | Method and system for providing system security services |
US7854002B2 (en) * | 2007-04-30 | 2010-12-14 | Microsoft Corporation | Pattern matching for spyware detection |
US7685547B1 (en) * | 2007-07-02 | 2010-03-23 | Cadence Design Systems, Inc. | Method, system, and computer program product for generating automated assumption for compositional verification |
US20090265786A1 (en) * | 2008-04-17 | 2009-10-22 | Microsoft Corporation | Automatic botnet spam signature generation |
US8176085B2 (en) * | 2008-09-30 | 2012-05-08 | Microsoft Corporation | Modular forest automata |
US8892580B2 (en) * | 2010-11-03 | 2014-11-18 | Microsoft Corporation | Transformation of regular expressions |
US20120158768A1 (en) * | 2010-12-15 | 2012-06-21 | Microsoft Corporation | Decomposing and merging regular expressions |
US9398033B2 (en) | 2011-02-25 | 2016-07-19 | Cavium, Inc. | Regular expression processing automaton |
CN102693372B (en) * | 2011-03-24 | 2015-01-07 | 群联电子股份有限公司 | Internal memory storage device, internal memory controller and virus scanning method |
WO2013020003A1 (en) | 2011-08-02 | 2013-02-07 | Cavium, Inc. | Packet classification by an optimised decision tree |
US9203805B2 (en) | 2011-11-23 | 2015-12-01 | Cavium, Inc. | Reverse NFA generation and processing |
KR101414061B1 (en) * | 2013-08-26 | 2014-07-04 | 한국전자통신연구원 | Apparatus and method for measuring ids rule similarity |
US9426166B2 (en) * | 2013-08-30 | 2016-08-23 | Cavium, Inc. | Method and apparatus for processing finite automata |
US9507563B2 (en) | 2013-08-30 | 2016-11-29 | Cavium, Inc. | System and method to traverse a non-deterministic finite automata (NFA) graph generated for regular expression patterns with advanced features |
US9426165B2 (en) * | 2013-08-30 | 2016-08-23 | Cavium, Inc. | Method and apparatus for compilation of finite automata |
US9419943B2 (en) | 2013-12-30 | 2016-08-16 | Cavium, Inc. | Method and apparatus for processing of finite automata |
US9275336B2 (en) | 2013-12-31 | 2016-03-01 | Cavium, Inc. | Method and system for skipping over group(s) of rules based on skip group rule |
US9544402B2 (en) | 2013-12-31 | 2017-01-10 | Cavium, Inc. | Multi-rule approach to encoding a group of rules |
US9667446B2 (en) | 2014-01-08 | 2017-05-30 | Cavium, Inc. | Condition code approach for comparing rule and packet data that are provided in portions |
US9904630B2 (en) | 2014-01-31 | 2018-02-27 | Cavium, Inc. | Finite automata processing based on a top of stack (TOS) memory |
US9602532B2 (en) | 2014-01-31 | 2017-03-21 | Cavium, Inc. | Method and apparatus for optimizing finite automata processing |
US10110558B2 (en) | 2014-04-14 | 2018-10-23 | Cavium, Inc. | Processing of finite automata based on memory hierarchy |
US10002326B2 (en) | 2014-04-14 | 2018-06-19 | Cavium, Inc. | Compilation of finite automata based on memory hierarchy |
US9438561B2 (en) | 2014-04-14 | 2016-09-06 | Cavium, Inc. | Processing of finite automata based on a node cache |
CN106021109A (en) * | 2016-05-20 | 2016-10-12 | 浪潮电子信息产业股份有限公司 | Automatic frame model for program structure analysis |
CN112506789B (en) * | 2020-12-17 | 2022-08-02 | 中国科学院计算技术研究所 | Parallel pattern matching method for data packet detection |
Citations (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5319776A (en) | 1990-04-19 | 1994-06-07 | Hilgraeve Corporation | In transit detection of computer virus with safeguard |
US5414833A (en) | 1993-10-27 | 1995-05-09 | International Business Machines Corporation | Network security system and method using a parallel finite state machine adaptive active monitor and responder |
US5623600A (en) | 1995-09-26 | 1997-04-22 | Trend Micro, Incorporated | Virus detection and removal apparatus for computer networks |
US5978801A (en) | 1996-11-21 | 1999-11-02 | Sharp Kabushiki Kaisha | Character and/or character-string retrieving method and storage medium for use for this method |
US5982891A (en) | 1995-02-13 | 1999-11-09 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
CA2307529A1 (en) | 2000-03-29 | 2001-09-29 | Pmc-Sierra, Inc. | Method and apparatus for grammatical packet classifier |
US20020073330A1 (en) | 2000-07-14 | 2002-06-13 | Computer Associates Think, Inc. | Detection of polymorphic script language viruses by data driven lexical analysis |
US20020124187A1 (en) * | 2000-09-28 | 2002-09-05 | Recourse Technologies, Inc. | System and method for analyzing protocol streams for a security-related event |
US6487666B1 (en) * | 1999-01-15 | 2002-11-26 | Cisco Technology, Inc. | Intrusion detection signature analysis using regular expressions and logical operators |
US20030004689A1 (en) * | 2001-06-13 | 2003-01-02 | Gupta Ramesh M. | Hierarchy-based method and apparatus for detecting attacks on a computer system |
US20030051043A1 (en) * | 2001-09-12 | 2003-03-13 | Raqia Networks Inc. | High speed data stream pattern recognition |
US20030123447A1 (en) | 2001-12-31 | 2003-07-03 | Tippingpoint Technologies, Inc. | System and method for classifying network packets with packet content |
US6598034B1 (en) | 1999-09-21 | 2003-07-22 | Infineon Technologies North America Corp. | Rule based IP data processing |
US6609205B1 (en) * | 1999-03-18 | 2003-08-19 | Cisco Technology, Inc. | Network intrusion detection signature analysis using decision graphs |
US20030221013A1 (en) * | 2002-05-21 | 2003-11-27 | John Lockwood | Methods, systems, and devices using reprogrammable hardware for high-speed processing of streaming data to find a redefinable pattern and respond thereto |
US20040105298A1 (en) | 2002-11-18 | 2004-06-03 | Arm Limited | Apparatus and method for managing processor configuration data |
WO2004079571A2 (en) | 2003-02-28 | 2004-09-16 | Lockheed Martin Corporation | Hardware accelerator state table compiler |
US6880087B1 (en) * | 1999-10-08 | 2005-04-12 | Cisco Technology, Inc. | Binary state machine system and method for REGEX processing of a data stream in an intrusion detection system |
US20050278783A1 (en) | 2004-06-14 | 2005-12-15 | Lionic Corporation | System security approaches using multiple processing units |
US20050278781A1 (en) | 2004-06-14 | 2005-12-15 | Lionic Corporation | System security approaches using sub-expression automata |
US20060005241A1 (en) | 2004-06-14 | 2006-01-05 | Lionic Corporation | System security approaches using state tables |
GB2417655A (en) | 2004-09-15 | 2006-03-01 | Streamshield Networks Ltd | Network-based platform for providing security services to subscribers |
US7185081B1 (en) * | 1999-04-30 | 2007-02-27 | Pmc-Sierra, Inc. | Method and apparatus for programmable lexical packet classifier |
-
2004
- 2004-06-14 US US10/868,665 patent/US7685637B2/en active Active
-
2005
- 2005-06-10 TW TW094119165A patent/TWI268057B/en active
- 2005-06-14 CN CN200510078075.2A patent/CN1716958B/en active Active
Patent Citations (25)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5319776A (en) | 1990-04-19 | 1994-06-07 | Hilgraeve Corporation | In transit detection of computer virus with safeguard |
US5414833A (en) | 1993-10-27 | 1995-05-09 | International Business Machines Corporation | Network security system and method using a parallel finite state machine adaptive active monitor and responder |
US5982891A (en) | 1995-02-13 | 1999-11-09 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
US5623600A (en) | 1995-09-26 | 1997-04-22 | Trend Micro, Incorporated | Virus detection and removal apparatus for computer networks |
US5978801A (en) | 1996-11-21 | 1999-11-02 | Sharp Kabushiki Kaisha | Character and/or character-string retrieving method and storage medium for use for this method |
US6792546B1 (en) | 1999-01-15 | 2004-09-14 | Cisco Technology, Inc. | Intrusion detection signature analysis using regular expressions and logical operators |
US6487666B1 (en) * | 1999-01-15 | 2002-11-26 | Cisco Technology, Inc. | Intrusion detection signature analysis using regular expressions and logical operators |
US6609205B1 (en) * | 1999-03-18 | 2003-08-19 | Cisco Technology, Inc. | Network intrusion detection signature analysis using decision graphs |
US7185081B1 (en) * | 1999-04-30 | 2007-02-27 | Pmc-Sierra, Inc. | Method and apparatus for programmable lexical packet classifier |
US6598034B1 (en) | 1999-09-21 | 2003-07-22 | Infineon Technologies North America Corp. | Rule based IP data processing |
US6880087B1 (en) * | 1999-10-08 | 2005-04-12 | Cisco Technology, Inc. | Binary state machine system and method for REGEX processing of a data stream in an intrusion detection system |
CA2307529A1 (en) | 2000-03-29 | 2001-09-29 | Pmc-Sierra, Inc. | Method and apparatus for grammatical packet classifier |
US20020073330A1 (en) | 2000-07-14 | 2002-06-13 | Computer Associates Think, Inc. | Detection of polymorphic script language viruses by data driven lexical analysis |
US20020124187A1 (en) * | 2000-09-28 | 2002-09-05 | Recourse Technologies, Inc. | System and method for analyzing protocol streams for a security-related event |
US20030004689A1 (en) * | 2001-06-13 | 2003-01-02 | Gupta Ramesh M. | Hierarchy-based method and apparatus for detecting attacks on a computer system |
US20030051043A1 (en) * | 2001-09-12 | 2003-03-13 | Raqia Networks Inc. | High speed data stream pattern recognition |
US7180895B2 (en) * | 2001-12-31 | 2007-02-20 | 3Com Corporation | System and method for classifying network packets with packet content |
US20030123447A1 (en) | 2001-12-31 | 2003-07-03 | Tippingpoint Technologies, Inc. | System and method for classifying network packets with packet content |
US20030221013A1 (en) * | 2002-05-21 | 2003-11-27 | John Lockwood | Methods, systems, and devices using reprogrammable hardware for high-speed processing of streaming data to find a redefinable pattern and respond thereto |
US20040105298A1 (en) | 2002-11-18 | 2004-06-03 | Arm Limited | Apparatus and method for managing processor configuration data |
WO2004079571A2 (en) | 2003-02-28 | 2004-09-16 | Lockheed Martin Corporation | Hardware accelerator state table compiler |
US20060005241A1 (en) | 2004-06-14 | 2006-01-05 | Lionic Corporation | System security approaches using state tables |
US20050278781A1 (en) | 2004-06-14 | 2005-12-15 | Lionic Corporation | System security approaches using sub-expression automata |
US20050278783A1 (en) | 2004-06-14 | 2005-12-15 | Lionic Corporation | System security approaches using multiple processing units |
GB2417655A (en) | 2004-09-15 | 2006-03-01 | Streamshield Networks Ltd | Network-based platform for providing security services to subscribers |
Non-Patent Citations (7)
Title |
---|
Aho, Sethi, Ullman. "Compilers", 1986, SEC 3.7, pp. 121-128. XP002381613. |
C. Scott Ananian. "JLex: A Lexical Analyzer Generator for Java(TM)", version 1.2.6, Feb. 7, 2003, p. 1-2, Internet. XP002382680. |
Christopher R. Clark et al, "A pattern-matching co-processor for network intrusion detection systems" Field-Programmable Technology (FPT), Proceedings 2003 IEEE International Conference on Dec. 15-17, 2003. Piscataway, NJ, USA, IEEE, pp. 68-74. XP010688321; ISBN 0-7803-8320-6. |
Elliot Berk, JLex:A lexical analyzer generator for Java(TM), Sep. 6, 2000, http://www.cs.pitt.edu/~mock/cs2210/handouts/jlex-manual.pdf. |
Elliot Berk, JLex:A lexical analyzer generator for Java(TM), Sep. 6, 2000, http://www.cs.pitt.edu/˜mock/cs2210/handouts/jlex-manual.pdf. |
James Moscola. et al. "Implementation of a Content-Scanning Module for an Internet Firewall", Field-Programmable Custom Computing Machines, FCCM 2003. Proceedings the 11th Annual IEEE Symposium on Apr. 9-11, 2003, Piscataway, NJ, USA, IEEE. XP010655273; ISBN 0-7695-1979-2. |
Reetinder Sidhu. et al, "Fast Regular Expression Matching using FPGAs" Field-Programmable Custom Computing Machines, 2001. FCCM'01 . The 9th annual IEEE Symposium on rohaert park, CA, USA, Apr. 29, 2001, paragraph 02.4. XP010789123; ISBN 0-7695-2667-5. |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070118358A1 (en) * | 2005-11-08 | 2007-05-24 | Tom Alexander S | Phrase processor |
US20080263665A1 (en) * | 2007-04-20 | 2008-10-23 | Juniper Networks, Inc. | Network attack detection using partial deterministic finite automaton pattern matching |
US7904961B2 (en) * | 2007-04-20 | 2011-03-08 | Juniper Networks, Inc. | Network attack detection using partial deterministic finite automaton pattern matching |
US20080271141A1 (en) * | 2007-04-24 | 2008-10-30 | Juniper Networks, Inc. | Parallelized pattern matching using non-deterministic finite automata |
US9021582B2 (en) | 2007-04-24 | 2015-04-28 | Juniper Networks, Inc. | Parallelized pattern matching using non-deterministic finite automata |
US20100192225A1 (en) * | 2009-01-28 | 2010-07-29 | Juniper Networks, Inc. | Efficient application identification with network devices |
US8495733B1 (en) * | 2009-03-25 | 2013-07-23 | Trend Micro Incorporated | Content fingerprinting using context offset sequences |
US9083740B1 (en) | 2009-09-28 | 2015-07-14 | Juniper Networks, Inc. | Network traffic pattern matching using adaptive deterministic finite automata |
US20110093496A1 (en) * | 2009-10-17 | 2011-04-21 | Masanori Bando | Determining whether an input string matches at least one regular expression using lookahead finite automata based regular expression detection |
US8566344B2 (en) * | 2009-10-17 | 2013-10-22 | Polytechnic Institute Of New York University | Determining whether an input string matches at least one regular expression using lookahead finite automata based regular expression detection |
Also Published As
Publication number | Publication date |
---|---|
CN1716958B (en) | 2012-05-23 |
US20050278781A1 (en) | 2005-12-15 |
TW200541262A (en) | 2005-12-16 |
CN1716958A (en) | 2006-01-04 |
TWI268057B (en) | 2006-12-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7685637B2 (en) | System security approaches using sub-expression automata | |
US7216364B2 (en) | System security approaches using state tables | |
EP1607823A2 (en) | Method and system for virus detection based on finite automata | |
US7596809B2 (en) | System security approaches using multiple processing units | |
US9990583B2 (en) | Match engine for detection of multi-pattern rules | |
US9602548B2 (en) | System and method for intelligent state management | |
CN107122221B (en) | Compiler for regular expressions | |
US8656039B2 (en) | Rule parser | |
US8706709B2 (en) | System and method for intelligent term grouping | |
US20110258197A1 (en) | Method and apparatus for data capture and analysis system | |
US11546295B2 (en) | Industrial control system firewall module | |
KR20140061359A (en) | Anchored patterns | |
US8543528B2 (en) | Exploitation of transition rule sharing based on short state tags to improve the storage efficiency | |
Hu et al. | Detecting cryptojacking traffic based on network behavior features | |
US7779464B2 (en) | System security approaches utilizing a hierarchical memory system | |
CN103093147B (en) | A kind of method identifying information and electronic installation | |
Weng et al. | Deep packet pre-filtering and finite state encoding for adaptive intrusion detection system | |
CN115766258B (en) | Multi-stage attack trend prediction method, equipment and storage medium based on causal relationship graph | |
Yang et al. | Two-phase Pattern Matching for Regular Expressions in Intrusion Detection Systems. | |
Parveen | Digital Investigations: Navigating Challenges in Tool Selection for Operating System Forensics | |
JP2005223870A (en) | Method and system for finding illegal communication from log of communication packet | |
CN117951742A (en) | Data processing method, apparatus, device, medium, and program product | |
CN116192448A (en) | Malicious sample data packet analysis method and device and electronic equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: LIONIC CORPORATION, TAIWAN Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:ZHAO, SHI-MING;CHIEN, SHIH-WEI;REEL/FRAME:015890/0109 Effective date: 20040920 Owner name: LIONIC CORPORATION,TAIWAN Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:ZHAO, SHI-MING;CHIEN, SHIH-WEI;REEL/FRAME:015890/0109 Effective date: 20040920 |
|
AS | Assignment |
Owner name: LIONIC CORPORATION, TAIWAN Free format text: CHANGE OF THE ADDRESS OF THE ASSIGNEE;ASSIGNOR:LIONIC CORP.;REEL/FRAME:020704/0852 Effective date: 20080327 Owner name: LIONIC CORPORATION,TAIWAN Free format text: CHANGE OF THE ADDRESS OF THE ASSIGNEE;ASSIGNOR:LIONIC CORP.;REEL/FRAME:020704/0852 Effective date: 20080327 |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
FPAY | Fee payment |
Year of fee payment: 4 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YR, SMALL ENTITY (ORIGINAL EVENT CODE: M2552) Year of fee payment: 8 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 12TH YR, SMALL ENTITY (ORIGINAL EVENT CODE: M2553); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY Year of fee payment: 12 |